Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12336: SQL Injection in Campcodes Retro Basketball Shoes Online Store

0
Medium
VulnerabilityCVE-2025-12336cvecve-2025-12336
Published: Tue Oct 28 2025 (10/28/2025, 00:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Retro Basketball Shoes Online Store

Description

A vulnerability was identified in Campcodes Retro Basketball Shoes Online Store 1.0. Affected by this issue is some unknown functionality of the file /admin/admin_index.php. Such manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 21:44:29 UTC

Technical Analysis

CVE-2025-12336 is a SQL injection vulnerability identified in Campcodes Retro Basketball Shoes Online Store version 1.0. The vulnerability resides in the /admin/admin_index.php file, where the Username parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw can be exploited remotely without requiring authentication or user interaction, enabling attackers to manipulate backend SQL queries. Exploitation could lead to unauthorized data disclosure, modification, or deletion, impacting the confidentiality, integrity, and availability of the store's database. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) reflects that the attack is network-based, requires low attack complexity, no privileges, and no user interaction, with low to limited impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, proof-of-concept code is publicly available, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, and no official patches have been linked yet. This vulnerability is critical for organizations running this specific e-commerce platform, especially those with sensitive customer data or financial transactions. The attack vector targets the administrative interface, which may be exposed or insufficiently protected in some deployments, increasing exposure risk.

Potential Impact

The SQL injection vulnerability in the admin interface of the Campcodes Retro Basketball Shoes Online Store can have significant impacts on affected organizations. Attackers exploiting this flaw can gain unauthorized access to sensitive customer data, including personal and payment information, leading to data breaches and regulatory non-compliance. They may also alter or delete critical data, disrupting business operations and damaging trust. The ability to execute arbitrary SQL commands remotely without authentication increases the risk of widespread compromise. This can lead to financial losses, reputational damage, and potential legal consequences. Additionally, attackers might leverage the vulnerability as a foothold to escalate privileges or move laterally within the network. Although the CVSS score is medium, the ease of exploitation and the critical nature of the data handled by e-commerce platforms elevate the threat's seriousness. Organizations worldwide using this software or similar vulnerable versions face risks of targeted attacks, especially in regions with active cybercriminal groups focusing on retail and e-commerce sectors.

Mitigation Recommendations

To mitigate CVE-2025-12336 effectively, organizations should implement the following specific measures: 1) Immediately restrict access to the /admin/admin_index.php interface by IP whitelisting or VPN-only access to reduce exposure. 2) Implement strict input validation and sanitization on the Username parameter to block malicious SQL payloads. 3) Refactor the application code to use parameterized queries or prepared statements instead of dynamic SQL concatenation to eliminate injection vectors. 4) Monitor web server and database logs for unusual query patterns or repeated failed login attempts indicative of exploitation attempts. 5) Conduct a thorough security audit of the entire application to identify and remediate other potential injection points. 6) If possible, upgrade to a patched version once available or apply vendor-provided patches promptly. 7) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the admin interface. 8) Educate administrators on secure credential management and enforce strong authentication mechanisms to limit unauthorized access. 9) Regularly back up databases and test restoration procedures to minimize impact in case of data compromise. These targeted actions go beyond generic advice and directly address the vulnerability's exploitation path and risk factors.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-27T12:41:34.030Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69000cd9ba6dffc5e21dd5b8

Added to database: 10/28/2025, 12:22:49 AM

Last enriched: 2/24/2026, 9:44:29 PM

Last updated: 3/24/2026, 2:15:34 AM

Views: 199

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses